Behavioral task
behavioral1
Sample
4492be5d10cad17058921cc41a55ad3fe9d78749dc582b42a500a27d3f4f0244.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4492be5d10cad17058921cc41a55ad3fe9d78749dc582b42a500a27d3f4f0244.exe
Resource
win10v2004-20240226-en
General
-
Target
4492be5d10cad17058921cc41a55ad3fe9d78749dc582b42a500a27d3f4f0244
-
Size
1.9MB
-
MD5
4a54e6d4f65fdf32378f0225c05b6c0c
-
SHA1
d22973c232f39bcd9a2fa3cef541a8bfcf680656
-
SHA256
4492be5d10cad17058921cc41a55ad3fe9d78749dc582b42a500a27d3f4f0244
-
SHA512
3ea2d7af404e2e7c840ca19072ed94b28cfb174b1d42d3ea7330ba787d697e64c6360309f0ba89efd36c5d15b41dd8d2ab016ff659a26bc56f3d9648a0f61370
-
SSDEEP
49152:y/Ze6pYkUo8ADcD7VrBZPUwFSpDdKO7rZlDrbn8WcbOJas:AZe6Yz1BZMwF+xKQrrrFJas
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4492be5d10cad17058921cc41a55ad3fe9d78749dc582b42a500a27d3f4f0244
Files
-
4492be5d10cad17058921cc41a55ad3fe9d78749dc582b42a500a27d3f4f0244.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.jxmnr Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lpkez Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.g Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.d Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE